Attack Surface Reduction implementation report

  Рет қаралды 1,860

Jackson Felden - Cloud and Security

Jackson Felden - Cloud and Security

Күн бұрын

Implementing ASR (Attack Surface Reduction) rules protects your organization's devices and network leaving attackers with fewer options to break in.
ASR rules can be deployed via PowerShell, Group Policy, Configuration Manager, Configuration Manager Tenant Attach, or Microsoft Endpoint Manager.
Take a look at how you can review the ASR implementation status in your organization.
In this video you will learn:
1 - How to review ASR rules from MEM (Microsoft Endpoint Manager)
2 - How to review ASR implementation status in your tenant (report)
3 - How to implement ASR exclusions
Please check my two additional videos about ASR, they are:
Implementing attack surface reduction via group policy
• Implementing attack su...
How to improve the exposure & device score with ASR (Attack Surface Reduction)
• How to improve the exp...
Also, please consider subscribing to my channel for the latest videos
I hope you enjoy and thanks for watching
Jackson Felden
#DefenderForEndpoint #ASR #AttackSurfaceReduction #MEM #MicrosoftEndpointManager

Пікірлер
2.1 Design: MDE Settings Management, MDE from Zero to Hero
36:25
Jackson Felden - Cloud and Security
Рет қаралды 5 М.
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
1.1 Minimum requirements and licensing, MDE from Zero to Hero
19:31
Jackson Felden - Cloud and Security
Рет қаралды 3,5 М.
6.1 Alerts & incidents management, MDE from Zero to Hero
25:27
Jackson Felden - Cloud and Security
Рет қаралды 2,5 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Microsoft Intune From Zero to Hero
39:08
Andy Malone MVP
Рет қаралды 290 М.
NEVER install these programs on your PC... EVER!!!
19:26
JayzTwoCents
Рет қаралды 4,9 МЛН
6.2 Ransomware attack investigation, MDE from Zero to Hero
53:23
Jackson Felden - Cloud and Security
Рет қаралды 1,6 М.
4 CRITICAL Places to Use a YubiKey (beyond an email account)
13:08
All Things Secured
Рет қаралды 128 М.
7 Database Design Mistakes to Avoid (With Solutions)
11:29
Database Star
Рет қаралды 101 М.
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН